The attack dubbed “PhishPoint” is a recent cyber-attack scheme being used by foreign hackers. It demonstrates the craftiness and the extent that cybercriminals will go to in order to harvest your Microsoft Office 365 credentials. It uses several familiar aspects of Office 365 to lull potential victims into an assumption that everything is above board. But it’s not. Here’s what you need to...
Keep ReadingNo matter your profession, reusing passwords is a horrible idea. It’s dangerous and insecure. Reusing passwords is especially problematic for those working in fields like law, ones that require confidentiality in one form or another. Many people already know that reusing passwords is unsafe, but they do it anyway. One recent survey conducted by Lastline revealed that nearly half (around 45%) o...
Keep ReadingSuccessful businesses require smart leadership. How does a company effectively protect its profits? Planning for profits should also include company-wide management of expenses and security planning is high on the list. If the average ransomware payment has reached close to $15,000, a company’s leaders would want to plan ahead and ensure all security best practices for backups, network systems...
Keep ReadingWe can’t function without passwords. So much of the internet is built on the concept of a username plus a password that the concept is core to users’ internet experience. It’s a clever but imperfect system that could certainly be improved upon, but until a game-changing replacement comes along, we have to play the game. There’s a lot that doesn’t work very well about this system, and ...
Keep ReadingWhen Was Your Last Backup? Data backups are a critical part of protecting the information and files you cannot afford to lose. And yet, many people have bad backup habits – or no backup habits at all. March 31st is World Backup Day – a perfect opportunity for you to update your existing backups, double-check that your backups are functional and retrievable, or create that backup you...
Keep Reading4 IT Best Practices For Nonprofits The answer is to use follow the following four IT best practices. Consider them when developing your technology strategy. They will help you identify opportunities to optimize your financial resources, enable growth and achieve your mission. 1. Align Your Information Technology System With Your Mission. Sometimes technology is an afterthought for nonprofit...
Keep ReadingIs Windows Lite Microsoft’s Answer to Google’s Chrome OS? Microsoft is working on a new operating system — Lite — with a different look that’s designed for the casual computer user while targeting Google’s Chrome OS Windows Lite is the oft-rumored, highly anticipated stripped-down operating system that Microsoft is reportedly working and could be unveiled sometime in the spring ...
Keep ReadingSmall businesses are at considerable risk of cyberattack. With fewer staff resources available to maintain and monitor networks and fewer defenses in place, small businesses are an attractive target for hackers and other criminals. The risks of a cyberattack are considerable. Companies could spend tens of thousands of dollars just to recover from an attack. There’s also the reputational and reg...
Keep ReadingMicrosoft Excel Training Excel is one of the most versatile and most useful programs in the Microsoft Office suite. It’s also one of the trickiest to master without a little help from someone who understands the ins and outs of Excel. Join us for a special three-part online Microsoft Excel training session, available on-demand. Tune in from the comfort of your office, learn about Excel...
Keep ReadingDid you know? Microsoft is ending support for Windows 7 in January 2020. Beginning this April, Microsoft will start displaying pop-ups on all Windows 7 computers alerting the users that their support for Windows 7 will be ending. Don’t be alarmed. Microsoft also did the same thing with Windows XP before shutting down their support for the Windows XP Operating System. Read More {company...
Keep ReadingThere’s a new scam targeting highly-trafficked Instagram accounts, and anyone with several thousand followers on their account — including businesses and clients — are fair game to the fraudsters. The scheme masquerades as a false claim of copyright infringement, according to Kaspersky Labs, who first noticed the new way influential and popular users are being cajoled into giving up their cr...
Keep ReadingAttorneys have unique needs for the storage of information while needing to access data on clients and cases from remote locations. That’s why cloud computing has become such a popular option for lawyers. However, the value of cloud computing needs to be tempered with concerns about security and privacy. Below is your 2019 introductory guide to cloud computing for lawyers. What Is Cloud ...
Keep Reading